Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 03:11

General

  • Target

    d167da473d0818f428f0c3e34e17c195c6d3b6259c788beca1be3a743675844a.exe

  • Size

    4.6MB

  • MD5

    49cfa73d7dd2fe362a914b4bb628d174

  • SHA1

    ee9aab3efbb85a3ccdc2ec33953469cd9a4a7067

  • SHA256

    d167da473d0818f428f0c3e34e17c195c6d3b6259c788beca1be3a743675844a

  • SHA512

    c41aadb4a176923734df9705f0c473b982f4ce0da7c400a408091e2ad8f9117a8dc0cc25b8b27c8236e5d2f0692defcc415bd5ea47b51bb7e8dc09930a18c8ae

  • SSDEEP

    98304:yOySfRmDk7aphPPUqCjqeBwgKX19iNFg5h1GDVCo:yOFLepcB1aqqBIVJ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d167da473d0818f428f0c3e34e17c195c6d3b6259c788beca1be3a743675844a.exe
    "C:\Users\Admin\AppData\Local\Temp\d167da473d0818f428f0c3e34e17c195c6d3b6259c788beca1be3a743675844a.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2676
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding AD81867D4E5E1C32B6DD96330EC259A1 C
      2⤵
      • Loads dropped DLL
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_2676\dialog.jpg

    Filesize

    36KB

    MD5

    abf1076064505dee794fa7aed67252b8

    SHA1

    358d4e501bb3007feece82a4039cc1050f23fab4

    SHA256

    fb0d133f05de6aa6a7a3491ae532191a60c438b35d9ff7bfec9e63131f6f0c73

    SHA512

    9a4680a8d186c1d7550b5e03cbdd095b0c88b2e0249a3af75fa0253d2c9a6f0aa1dd570ecf1a273683a14e6c7b5fb11678be3da439a3bf23eab790372e96e321

  • C:\Users\Admin\AppData\Local\Temp\MSI4DA4.tmp

    Filesize

    632KB

    MD5

    9b4b4ea6509e4db1e2a8f09a7c6f8f04

    SHA1

    512880abe3c9696edb042599bd199f1d05210aa2

    SHA256

    3774c31039cb87ed0327f49a00abd7b4211ac938a46378b8661cd5d8b3b34f94

    SHA512

    63b4788a3ad000c08582f55532dc06bf88bc4111837a63e8157e0f5f668225f46758f9481b6e526a5a813f4f0cc9be65fb4107d2135c61083274592af03ba608

  • C:\Users\Admin\AppData\Roaming\何故\盘古IM 2.3.1.0\install\E818D2F\盘古IM-新.msi

    Filesize

    2.5MB

    MD5

    7a692fda0f2c720ff84d8e90a2b21d48

    SHA1

    e69d224db0d3d88fb39efe3668eabb17a3ec33b4

    SHA256

    b13cc76c6150b78be34a81df40069b3b53afb97162d808a3a92f33c3cdc3bb14

    SHA512

    eefcf56538339252ae3be0366ed7cbdee8a3915d0a98a3cf7c8bb0ace72f62d61fa30db3671d972acb79a7f7975991badc6a3151eae69e98a821394da21d3836

  • C:\Users\Admin\AppData\Roaming\何故\盘古IM 2.3.1.0\install\decoder.dll

    Filesize

    215KB

    MD5

    c098b1c216866d9ca0eeae0a46a46a0a

    SHA1

    b68890ebc6af792cac62ab0e2ade6a7b777c58ae

    SHA256

    0960f28f586617647f16ccb2ad9b38fba521605015a4c51f661d4bceca251db0

    SHA512

    fac75162310f554baccb49b5b88ebceaa8b288e7aca010e0b364077dd2738cd0d484633bef7270fad064813a7b01b7d26e000c0561d20925fa5a6ea902d452e6

  • \Users\Admin\AppData\Local\Temp\MSI4BDF.tmp

    Filesize

    550KB

    MD5

    0dd1f1ff906c4d1fc7ad962e994cad7f

    SHA1

    4d1549cf7ef6a63baf83280143d7797d4df4fa2d

    SHA256

    140f578569adbf831f87275091af9ca200ed8b2453cbe729a0249b9b6f6b4588

    SHA512

    8d5622bb299bf6bebf3eaa266a9fcbbc953a729e9d9ca20f8f358d7a14599d0a017feef58aa8d3aadc075c6211478bbac2d38e38e36e34096d4dceb51ffd00cb

  • memory/2676-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2676-48-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB